cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,247Updated last month
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β559Updated last week
- π A curated list of awesome Docker security resourcesβ701Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,186Updated 3 months ago
- Checklist for container security - devsecops practicesβ1,612Updated 3 months ago
- β571Updated 3 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,175Updated last year
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ488Updated 2 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,569Updated 3 years ago
- My cheatsheet notes to pentest AWS infrastructureβ699Updated 3 years ago
- Automating situational awareness for cloud penetration tests.β2,269Updated this week
- A Blazing fast Security Auditing tool for Kubernetesβ1,007Updated last year
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,060Updated last month
- π¦π Awesome list of secrets in environment variables π₯οΈβ899Updated 3 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,022Updated last year
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmβ¦β769Updated last year
- all paths lead to cloudsβ638Updated 2 years ago
- Peirates - Kubernetes Penetration Testing toolβ1,402Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,155Updated 8 months ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)β439Updated 3 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized enβ¦β1,214Updated 11 months ago
- A curated list of awesome CI CD security resourcesβ798Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ2,218Updated last week
- A curated list of awesome Kubernetes security resourcesβ949Updated 2 years ago
- Automated Red Team Infrastructure deployement using Dockerβ1,259Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security fieldβ1,428Updated last year
- β366Updated 2 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,035Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,474Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,201Updated 7 months ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,329Updated last year